Page 4 of 38 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 47EXPL: 0

mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials. • http://lists.apple.com/archives/security-announce/2004/Dec/msg00000.html http://www.ciac.org/ciac/bulletins/p-049.shtml http://www.securityfocus.com/bid/9571 http://www.securitytracker.com/alerts/2004/Dec/1012414.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18347 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in chroot on SCO UnixWare 7.1.1 through 7.1.4 allows local users to escape the chroot jail and conduct unauthorized activities. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.22/SCOSA-2005.22.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.2/SCOSA-2005.2.txt http://secunia.com/advisories/13915 http://secunia.com/advisories/15339 http://www.securityfocus.com/bid/12300 https://exchange.xforce.ibmcloud.com/vulnerabilities/18970 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

SCO Internet Manager (mana) allows local users to execute arbitrary programs by setting the REMOTE_ADDR environment variable to cause menu.mana to run as if it were called from ncsa_httpd, then modifying the PATH environment variable to point to a malicious "hostname" program. SCO Internet Manager (mana) permite a usuarios locales ejecutar programas arbitrarios estableciendo la variable de entorno REMOTE_ADDR de forma que haga que menu.mana se ejecute como si fuera llamado desde ncsa_httpd, y entonces modificando la variable de entorno PATH para apuntar a un programa "hostname" malicioso. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0742 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in display of Merge before 5.3.23a in UnixWare 7.1.x allows local users to gain root privileges. Vulnerabilidad desconocida en la visualización de Merge anteriores a 5.3.23a en UnixWare 7.1x permite a usuarios locales ganar privilegios de root. • http://marc.info/?l=bugtraq&m=105889063714201&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

The getdbm procedure in ypxfrd allows local users to read arbitrary files, and remote attackers to read databases outside /var/yp, via a directory traversal and symlink attack on the domain and map arguments. El procedimiento getdbm en ypxfrd permite a usuarios locales leer ficheros arbitrarios, y a atacantes remotos leer bases de datos fuera de /var/yp, mediante ataques de atravesamiento de directorios y de enlaces simbólicos en los argumentos de dominio y mapa. • ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.40 http://marc.info/?l=bugtraq&m=103426842025029&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/47903 http://www.iss.net/security_center/static/10329.php http://www.kb.cert.org/vuls/id/538033 http://www.securityfocus.com/bid/5937 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2423 •